Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-20059

EPSS 1.46% · P81
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2019-20059

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
payment_manage.ajax.php and various *_manage.ajax.php in MFScripts YetiShare 3.5.2 through 4.5.4 directly insert values from the sSortDir_0 parameter into a SQL string. This allows an attacker to inject their own SQL and manipulate the query, typically extracting data from the database, aka SQL Injection. NOTE: this issue exists because of an incomplete fix for CVE-2019-19732.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
MFScripts YetiShare SQL注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Mellow Fish YetiShare是英国Mellow Fish公司的一套基于PHP的文件托管网站系统脚本。 MFScripts YetiShare 3.5.2至4.5.4版本中的payment_manage.ajax.php文件和various *_manage.ajax.php文件中存在SQL注入漏洞。攻击者可利用该漏洞执行SQL命令,泄露数据库信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2019-20059

#POC DescriptionSource LinkShenlong Link
1Yetishare SQL Injection in sSortDir_0 parameter - v3.5.2 - v4.5.4. Apart from an admin being able to exploit this, it could also be used in a CSRF attack to trick an admin user into running malicious queries.https://github.com/cve-vuln/CVE-2019-20059POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2019-20059

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-02-10 · 45 CVEs total

CVE-2019-17061Cypress Semiconductor PSoC 4 缓冲区错误漏洞
CVE-2020-8841TestLink SQL注入漏洞
CVE-2019-17518Dialog Semiconductor SDK 缓冲区错误漏洞
CVE-2019-17520Texas Instruments SDK 安全漏洞
CVE-2017-18642Syska Smart Bulb 信息泄露漏洞
CVE-2020-7217openSUSE wicked 安全漏洞
CVE-2020-8596WordPress Participants Database SQL注入漏洞
CVE-2019-14514Microvirt MEmu 操作系统命令注入漏洞
CVE-2016-5710NetApp Snap Creator Framework 安全漏洞
CVE-2019-19195Microchip Technology BluSDK Smart 安全漏洞
CVE-2019-17517Dialog Semiconductor SDK 缓冲区错误漏洞
CVE-2019-17060NXP Semiconductors KW41Z 缓冲区错误漏洞
CVE-2020-8840FasterXML jackson-databind 代码问题漏洞
CVE-2019-19668Rumpus FTP Web File Manager File Types组件跨站请求伪造漏洞
CVE-2019-19669Rumpus FTP Web File Manager Upload Center Forms组件跨站请求伪造漏洞
CVE-2019-19670Rumpus FTP Server Web File Manager Web设置组件注入漏洞
CVE-2019-19667Rumpus FTP Web File Manager Block Clients组件跨站请求伪造漏洞
CVE-2019-19666Rumpus FTP Web File Manager 跨站请求伪造漏洞
CVE-2019-19661Rumpus FTP Server Web File Manager 跨站脚本漏洞
CVE-2019-19662Rumpus FTP Server Web File Manager 跨站请求伪造漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2019-20059

No comments yet


Leave a comment